Statistics for topic cyber-threat-intelligence
RepositoryStats tracks 559,549 Github repositories, of these 59 are tagged with the cyber-threat-intelligence topic. The most common primary language for repositories using this topic is Python (23).
Stargazers over time for topic cyber-threat-intelligence
Most starred repositories for topic cyber-threat-intelligence (view more)
Trending repositories for topic cyber-threat-intelligence (view more)
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Cortex: a Powerful Observable Analysis and Active Response Engine
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
A python app to predict Att&ck tactics and techniques from cyber threat reports
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead in the field. It provides a valuable resource for those dedica...
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Web app that provides basic navigation and annotation of ATT&CK matrices
Cortex: a Powerful Observable Analysis and Active Response Engine
Modular web-application honeypot platform built using go and gin
Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syntax of popular search engines.